Top Banner
PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma
29

PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Jan 21, 2016

Download

Documents

Brent Lucas
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

PRIVACY-PRESERVING DATA PUBLISHING

Paper presenter: Erik Wang

Discussion leader: XiaoXiao Ma

Page 2: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Overview

Research background Paper go through Key Technical

Anonymization Information Loss Metric Privacy Models

Conclusions

Page 3: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Research background

Objective To handle data privacy issue when

publishing data, sensitive data should not be disclosed.

Solution Try to modify data so that to avoid

adversary to analyses the published data by apply his background knowledge to get sensitive information

Page 4: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Overview

Research background Paper go through Key Technical

Anonymization Information Loss Metric Privacy Models

Conclusions

Page 5: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Paper go through

This paper is the first 2 chapter of the bookPrivacy-preserving data publishing an overview. Published in 2010 How does the data owner modify the data? How does the data owner guarantee that the modified data contain

no sensitive information? How much does the data need to be modified so that no sensitive

information remains?

Chapter 1: Background of the research Chapter 2: Concepts

Technique – Anonymization

Metric – information loss metric

Model – Privacy models

Page 6: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Identify the problem

Page 7: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Concepts

Sensitive (data, value, tuple, attribute…)Something will offend privacy – not happy to share

others Qusai-identifier (a.k.a QI)Quasi-identifier attributes are those that can serve as an

identifier for an individual.

Page 8: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Overview

Research background Paper go through Key Technical

Anonymization Information Loss Metric Privacy Models

Conclusions

Page 9: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Anonymization

Grouping-and-breaking

Break exact linkage between QI value and sensitive value

Perturbation

Change / generate to fake value

Page 10: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Grouping-and-breaking

SuppressionChange value to ANY, denoted by *

Generalization Change to another categorical value to denoting a

broader concept of the original one Global and local recording – how deep we do

generalization

Bucketization (breaking)Divide data into partitions, hidden sensitive data

with ID, and generate sensitive table which connect with main table by ID

Page 11: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Grouping-and-breaking

Method Advantage DrawbackSuppression •Easy to use

•Perfect to hidden data•OVERKILL

Generalization •Change value to more generalized one i.e. numeric to a range, categorical value to boarder concept

•Extra work to maintain taxonomy•Lost original actual value

Global recording

•Consistent represent anonymized table

•More information loss

Local recording

•Table generated by local recoding is more similar to the original table, and thus the data analysis based on this table is more accurate.

•cannot give as consistent a representation of the anonymized table as global recoding

Bucketization •Allowing users to obtain the original specific values for data analysis.

•Need extra table•requires some sophisticated analysis of the data generated by bucketization

Page 12: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Perturbation

Adding Noise applicable to numeric attributes. If the original numeric value is v, adding noise will change the

value to v +∆ by adding a value ∆ that follows some distribution.

Swapping Swapping the two values (of the same attribute) of any two tuples in the

dataset.

Mode-fitting-and-regenerating Modeling – parameter estimation – data regeneration i.e. condensation:

Clustering data, find center, radius and size, and then regenerate new data according to the cluster

Page 13: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Perturbation

Method Advantage Drawback

Add noise it maintains some statistical information such as means and correlations

may introduce some values that do not exist in the real world.

Swapping the domain of each single attribute after value swapping remains unchanged.

combination of the swapped value of this attribute and the values of other attributes may not exist in one of these two tuples

regeneration the statistics of the data captured by the model are maintained.

it may generate some tuples that may not exist in real data.

Page 14: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Overview

Research background Paper go through Key Technical

Anonymization Information Loss Metric Privacy Models

Conclusions

Page 15: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Information loss metric

The cost of anonymization is given by the distortion ratio of the resulting data set. Value of the attribute of a tuple been generalized,

there will be distortion. Let di,j be the distortion of the value of attribute Ai

of tuple tj

The distortion of the whole data set distortion dis = ∑i,j di,j

Distortion ratio is disdataset / disfull_generatlized

Page 16: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Information loss metric

Distortion = 4 +3 =7

Distortion = 3 * 6 = 18

Distortion ration = 7 / 18

= 38.89%

Page 17: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Overview

Research background Paper go through Key Technical

Anonymization Information Loss Metric Privacy Models

Conclusions

Page 18: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Privacy models: k-anonymity

k- anonymity The size of the QI-group is at least k. A table T is said to satisfy k-anonymity (or a table is said to be k-

anonymous) if each QI-group satisfies k-anonymity. The objective of k-anonymity is to make sure that each individual

is indistinguishable from at least k − 1 other individuals in the table.

2 - anonymity

Sensitive attributes are not protected!

Page 19: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Privacy models: l-diversity

l – Diversity The probability that any tuple in this group is

linked to a sensitive value is at most 1/l. The table satisfies l-diversity if each QI-group

satisfies l-diversity.

2-diversity table

P = ½ = 1/ l l = 2

P = 2/4 = 1/ l l = 2

Page 20: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Privacy models: (a,k) anonymity Given a real number α ∈[0, 1] and a positive

integer k. QI-group G is said to satisfy (α, k)-anonymity if

the number of tuples in G is at least k and the frequency (in fraction) of each sensitive value in G is at most α.

If α = 1/l, it is a simplified l-diversity model

(0.5, 2)-anonymity table

Page 21: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Privacy models: monotonicity Monotonicity:

Let R be a privacy model. R is said to satisfy the monotonicity property if, for any two QI-groups G1 and G2 satisfying R, the final QI-group that is a result of merging all tuples in G1 and all tuples in G2 satisfies R

Model Monotonicity

2-diversity table √

(0.5, 2)-anonymity table √

Page 22: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Privacy models: numeric sensitive attributes

Straight-forward: Transformed numeric attribute is to a categorical one, then be anonymized leads information loss.

(k,e) – anonymity model each QI-group is of size at least k and has a

range of the sensitive values at least e.

Page 23: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Privacy models: (Є, m) – anonymity

Є is a non-negative real number and m is a positive integer. Each QI-group G satisfy for each sensitive numeric value

that appears in G, the frequency (in fraction) of the tuples with sensitive numeric values close to s is at most 1/m where the closeness among numeric sensitive values is captured by parameter Є. Absolute difference, a numeric value s1 is close to s2 if |s1 −

s2| ≤ Є Relative difference , a numeric value s1 is close to s2 if |s1 −

s2|≤ Є s2 Does not obey the monotonicity property

¾ > ½

Page 24: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Privacy models: personalized privacy

Each individual can provide his/her preference on the protection of his/her sensitive value, denoted by a guarding node.

Any QI-group in the published table that may contain the individual should contain at most 1/l tuples with guardingvalues

A variation of l-diversity so that it satisfies monotonicity property

Page 25: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Privacy models: Multiple QI attributes

Extend the possibility of QI attribute from one external source to multiple source

The model satisfiesmonotonicity property

Page 26: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Privacy models: Free-form anonymity

Proposed based on whether a value is easily observable. If a value is easily observed, it is assumed that it is non-sensitive and is regarded as a quasi-identifier. Otherwise, it is regarded as a sensitive value.

Add a condition to the definition of “Sensitive”

Page 27: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Publishing additional tables

publish some additional tables that are not sensitive at all so that these tables together can provide better utility

Page 28: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Conclusion

Fundamental concepts that underlie all approaches to privacy preserving data publishing.

How to modify the data (suppression, generalization, bucketization and perturbation)

Minimizing the information loss of the modified data by using privacy model.

Page 29: PRIVACY-PRESERVING DATA PUBLISHING Paper presenter: Erik Wang Discussion leader: XiaoXiao Ma.

Questions and Discussion